Rekayasa Perangkat Lunak

Size: px
Start display at page:

Download "Rekayasa Perangkat Lunak"

Transcription

1 Rekayasa Perangkat Lunak Untuk SISTEM KOMPUTER Kuliah 7: Use Case Mohammad Iqbal Based-on slide Ivan Marsic

2 Topik Aktor, Tujuan Sketsa/Ringkasan Use Cases Diagram Use Case Matrik Traceability System Boundary dan Subsystem Use Case Specification Detail Diagram System Sequence Security dan Managemen Resiko

3 Use Cases Digunakan untuk analisis kebutuhan fungsional dan Specification Use case adalah deskripsi langkah demi langkah bagaimana user menggunakan sistem untuk menyelesaikan tujuan bisnis Detailed use cases are usually written as usage scenarios or scripts, showing an envisioned sequence of actions and interactions between the external actors and the system-to-be

4 Deriving Use Cases from System Requirements REQ1: Keep door locked and auto-lock REQ2: Lock w hen LOCK pressed REQ3: Unlock w hen valid key provided REQ4: Allow mistakes but prevent dictionary attacks REQ5: Maintain a history log REQ6: Adding/removing users at runtime REQ7: Configuring the device activation preferences REQ8: Inspecting the access history REQ9: Filing inquiries Y Actor Actor s Goal (what the actor intends to accomplish) Use Case Name Landlord To disarm the lock and enter, and get space lighted up. Unlock (UC-1) Landlord To lock the door & shut the lights (sometimes?). Lock (UC-2) Landlord To create a new user account and allow access to home. AddUser (UC-3) Landlord To retire an existing user account and disable access. RemoveUser (UC-4) Tenant To find out who accessed the home in a given interval of time and potentially file complaints. InspectAccessHistory (UC-5) Tenant To disarm the lock and enter, and get space lighted up. Unlock (UC-1) Tenant To lock the door & shut the lights (sometimes?). Lock (UC-2) Tenant To configure the device activation preferences. SetDevicePrefs (UC-6) LockDevice To control the physical lock mechanism. UC-1, UC-2 LightSwitch To control the lightbulb. UC-1, UC-2 [to be identified] To auto-lock the door if it is left unlocked for a given interval of time. AutoLock (UC-2) ( Actors already given if working from user stories instead of system requirements )

5 Types of Actors Initiating actor (also called primary actor or simply user ): initiates the use case to achieve a goal Participating actor (also called secondary actor): participates in the use case but does not initiate it. Subtypes of participating actors: Supporting actor: helps the system-to-be to complete the use case Offstage actor: passively participates in the use case, i.e., neither initiates nor helps complete the use case, but may be notified about some aspect of it (e.g., for keeping records)

6 Use Case Diagram: Device Control UC1: Unlock UC2: Lock UC3: AddUser UC4: RemoveUser UC5: InspectAccessHistory UC6: SetDevicePrefs UC7: AuthenticateUser UC8: Login system boundary First tier use cases Second tier use cases actor «initiate» «initiate» UC1: Unlock «include» UC7: AuthenticateUser «participate» «participate» «participate» LockDevice Tenant «initiate» «initiate» UC2: Lock «participate» «participate» LightSwitch «initiate + participate» Landlord communication use case Timer

7 Use Case Diagram: Account Management UC1: Unlock UC2: Lock UC3: AddUser UC4: RemoveUser UC5: InspectAccessHistory UC6: SetDevicePrefs UC7: AuthenticateUser UC8: Login Account Management Subsystem «initiate» UC3: AddUser Landlord «initiate» «participate» «initiate» «initiate» UC4: RemoveUser UC5: InspectAccessHistory «include» «include» «include» «include» UC8: Login Tenant UC6: SetDevicePrefs

8 GUI for UC6: Set Device Pref s Device Preferences File Configure Help Activate for valid key Activate for burglary attempt Lights Music Air-conditioning Heating Alarm bell Police Send SMS Apply Close ( NOTE: Lock device is mandatory, not an option )

9 Use Case Generalizations More abstract representations can be derived from particular representations UC1: Unlock UC2: Lock UC3: AddUser UC4: RemoveUser UC5: InspectAccessHistory UC6: SetDevicePrefs UC7: AuthenticateUser UC8: Login Authorized Person UC9: ManageUsers Tenant Landlord UC3: AddUser UC4: RemoveUser Actor Generalization Use Case Generalization

10 Optional Use Cases: «extend» Example optional use cases: ManageAccount UC5: InspectAccessHistory UC1: Unlock UC2: Lock UC3: AddUser UC4: RemoveUser UC5: InspectAccessHistory UC6: SetDevicePrefs UC7: AuthenticateUser UC8: Login UC6: SetDevicePrefs Key differences between «include» and «extend» relationships Is this use case optional? Is the base use case complete without this use case? Included use case No No Extending use case Yes Yes Is the execution of this use case conditional? Does this use case change the behavior of the base use case? No No Yes Yes [ Source: Robert Maksimchuk & Eric Naiburg: UML for Mere Mortals, Addison-Wesley, ]

11 Login Use Case? BAD: GOOD: Login Landlord AddUser SetDevicePrefs Landlord AddUser SetDevicePrefs Login

12 Traceability Matrix (1) Mapping: System requirements to Use cases REQ1: Keep door locked and auto-lock REQ2: Lock w hen LOCK pressed REQ3: Unlock w hen valid key provided REQ4: Allow mistakes but prevent dictionary attacks REQ5: Maintain a history log REQ6: Adding/removing users at runtime REQ7: Configuring the device activation preferences REQ8: Inspecting the access history REQ9: Filing inquiries Req t PW UC1 UC2 UC3 UC4 UC5 UC6 UC7 UC8 UC1: Unlock UC2: Lock UC3: AddUser UC4: RemoveUser UC5: InspectAccessHistory UC6: SetDevicePrefs UC7: AuthenticateUser UC8: Login REQ1 5 REQ2 2 REQ3 5 REQ4 4 REQ5 2 REQ6 1 REQ7 2 REQ8 1 REQ9 1 Max PW Total PW Continued for domain model, design diagrams,

13 Traceability Matrix Purpose To check that all requirements are covered by the use cases To check that none of the use cases is introduced without a reason (i.e., created not in response to any requirement) To prioritize the work on use cases

14 Schema for Detailed Use Cases Use Case UC-#: Name / Identifier [verb phrase] Related Requirements: Initiating Actor: Actor s Goal: Participating Actors: List of the requirements that are addressed by this use case Actor who initiates interaction with the system to accomplish a goal Informal description of the initiating actor s goal Actors that will help achieve the goal or need to know about the outcome Preconditions: Postconditions: Flow of Events for Main Success Scenario: What is assumed about the state of the system before the interaction starts What are the results after the goal is achieved or abandoned; i.e., what must be true about the system at the time the execution of this use case is completed 1. The initiating actor delivers an action or stimulus to the system (the arrow indicates the direction of interaction, to- or from the system) 2. The system s reaction or response to the stimulus; the system can also send a message to a participating actor, if any 3. Flow of Events for Extensions (Alternate Scenarios): What could go wrong? List the exceptions to the routine and describe how they are handled 1a. For example, actor enters invalid data 2a. For example, power outage, network failure, or requested data unavailable The arrows on the left indicate the direction of interaction: Actor s action; System s reaction

15 Use Case 1: Unlock Use Case UC-1: Related Requirem ts: Initiating Actor: Actor s Goal: Unlock REQ1, REQ3, REQ4, and REQ5 stated in Table 2-1 Any of: Tenant, Landlord To disarm the lock and enter, and get space lighted up automatically. Participating Actors: Preconditions: Postconditions: LockDevice, LightSwitch, Timer The set of valid keys stored in the system database is non-empty. The system displays the menu of available functions; at the door keypad the menu choices are Lock and Unlock. The auto-lock timer has started countdown from autolockinterval. Flow of Events for Main Success Scenario: 1. Tenant/Landlord arrives at the door and selects the menu item Unlock 2. include::authenticateuser (UC-7) 3. System (a) signals to the Tenant/Landlord the lock status, e.g., disarmed, (b) signals to LockDevice to disarm the lock, and (c) signals to LightSwitch to turn the light on 4. System signals to the Timer to start the auto-lock timer countdown 5. Tenant/Landlord opens the door, enters the home [and shuts the door and locks]

16 Subroutine «include» Use Case Use Case UC-7: AuthenticateUser (sub-use case) Related Requirements: Initiating Actor: Actor s Goal: Participating Actors: Preconditions: Postconditions: REQ3, REQ4 stated in Table 2-1 Any of: Tenant, Landlord To be positively identified by the system (at the door interface). AlarmBell, Police The set of valid keys stored in the system database is non-empty. The counter of authentication attempts equals zero. None worth mentioning. Flow of Events for Main Success Scenario: 1. System prompts the actor for identification, e.g., alphanumeric key 2. Tenant/Landlord supplies a valid identification key 3. System (a) verifies that the key is valid, and (b) signals to the actor the key validity Flow of Events for Extensions (Alternate Scenarios): 2a. Tenant/Landlord enters an invalid identification key 1. System (a) detects error, (b) marks a failed attempt, and (c) signals to the actor System (a) detects that the count of failed attempts exceeds the maximum allowed 1a. number, (b) signals to sound AlarmBell, and (c) notifies the Police actor of a possible break-in 2. Tenant/Landlord supplies a valid identification key 3. Same as in Step 3 above

17 Acceptance Test Case for UC-7 Authenticate User Test-case Identifier: Use Case Tested: Pass/fail Criteria: Input Data: Test Procedure: TC-1 UC-1, main success scenario, and UC-7 The test passes if the user enters a key that is contained in the database, with less than a maximum allowed number of unsuccessful attempts Numeric keycode, door identifier Expected Result: Step 1. Type in an incorrect keycode and a valid door identifier System beeps to indicate failure; records unsuccessful attempt in the database; prompts the user to try again Step 2. Type in the correct keycode and door identifier System flashes a green light to indicate success; records successful access in the database; disarms the lock device

18 Use Case 2: Lock Use Case UC-2: Related Requirements: Initiating Actor: Lock REQ1, REQ2, and REQ5 stated in Table 2-1 Any of: Tenant, Landlord, or Timer Actor s Goal: To lock the door & get the lights shut automatically (?) Participating Actors: Preconditions: LockDevice, LightSwitch, Timer The system always displays the menu of available functions. Postconditions: The door is closed and lock armed & the auto-lock timer is reset. Flow of Events for Main Success Scenario: 1. Tenant/Landlord selects the menu item Lock System (a) signals affirmation, e.g., lock armed, (b) signals to LockDevice to arm the lock (if 2. not already armed), (c) signal to Timer to reset the auto-lock counter, and (d) signals to LightSwitch to turn the light off (?) Flow of Events for Extensions (Alternate Scenarios): 2a. System senses that the door is not closed, so the lock cannot be armed 1. System (a) signals a warning that the door is open, and (b) signal to Timer to start the alarm counter 2. Tenant/Landlord closes the door System (a) senses the closure, (b) signals affirmation to the Tenant/Landlord, (c) signals to 3. LockDevice to arm the lock, (d) signal to Timer to reset the auto-lock counter, and (e) signal to Timer to reset the alarm counter

19 Use Case 3: Add User Use Case UC-3: Related Requirements: Initiating Actor: Actor s Goal: Participating Actors: Preconditions: Postconditions: AddUser REQ6 stated in Error! Reference source not found. Landlord To register new or remove departed residents at runtime. Tenant None worth mentioning. (But note that this use case is only available on the main computer and not at the door keypad.) The modified data is stored into the database. Flow of Events for Main Success Scenario: 1. Landlord selects the menu item ManageUsers 2. Landlord identification: Include Login (UC-8) 3. System (a) displays the options of activities available to the Landlord (including Add User and Remove User ), and (b) prompts the Landlord to make selection 4. Landlord selects the activity, such as Add User, and enters the new data 5. System (a) stores the new data on a persistent storage, and (b) signals completion Flow of Events for Extensions (Alternate Scenarios): 4a. Selected activity entails adding new users: Include AddUser (UC-3) 4b. Selected activity entails removing users: Include RemoveUser (UC-4)

20 Use Case 5: Inspect Access History Use Case UC-5: Inspect Access History Related Requirements: REQ8 and REQ9 stated in Table 2-1 Initiating Actor: Any of: Tenant, Landlord Actor s Goal: Participating Actors: Preconditions: To examine the access history for a particular door. Database, Landlord Tenant/Landlord is logged in the system and is shown a hyperlink View Access History. Postconditions: None. Flow of Events for Main Success Scenario: 1. Tenant/Landlord clicks the hyperlink View Access History 2. System prompts for the search criteria (e.g., time frame, door location, actor role, event type, etc.) or Show all 3. Tenant/Landlord specifies the search criteria and submits 4. System prepares a database query that best matches the actor s search criteria and retrieves the records from the Database 5. Database returns the matching records 6. System (a) additionally filters the retrieved records to match the actor s search criteria; (b) renders the remaining records for display; and (c) shows the result for Tenant/Landlord s consideration 7. Tenant/Landlord browses, selects interesting records (if any), and requests further investigation (with an accompanying complaint description) System (a) displays only the selected records and confirms the request; (b) archives the request in 8. the Database and assigns it a tracking number; (c) notifies Landlord about the request; and (d) informs Tenant/Landlord about the tracking number

21 System Boundary & Subsystems Use Case Variations Example: Case (a): Local face recognition Local computer Apartment building Face image Security camera Case (b): Network Remote face recognition FaceReco, Ltd.

22 Modified Use Case Diagram Authentication subsystem (FaceReco, Ltd.) is externalized from the system-to-be: UC1: Unlock UC2: Lock UC3: AddUser UC4: RemoveUser UC5: InspectAccessHistory UC6: SetDevicePrefs UC7: AuthenticateUser UC8: Login UC2: Lock Tenant «participate» UC1: Unlock «include» LockDevice UC7: AuthenticateUser «initiate» UC3: AddUser «participate» «participate» Landlord «initiate» UC4: RemoveUser «include» «include» «participate» FaceReco, Ltd. UC8: Login

23 Security and Risk Management Identifying and preempting the serious risks to system s safe and successful functioning Risk types: Intolerable As low as reasonably practical (ALARP) Acceptable Example abuse case input sequence: invalid-key, invalid-key, maxnumofattempts ; wait maxattemptperiod ; invalid-key, invalid-key,

24 System Sequence Diagram [Modeling System Workflows] Use case: Unlock User «initiating actor» select function( unlock") : System LockDevice «supporting actor» LightSwitch «supporting actor» Timer «offstage actor» prompt for the key enter key verify key signal: valid key, lock open open the lock turn on the light start ("duration ) Main success scenario Similar to UML sequence diagrams, but for actor interactions instead of software object interactions

25 System Sequence Diagram [Modeling System Workflows] Use case: Unlock User «initiating actor» select function( unlock") : System AlarmBell «supporting actor» Police «offstage actor» loop prompt for the key enter key verify key signal: invalid key prompt to try again sound alarm notify intrusion Alternate scenario (burglary attempt)

26 Activity Diagram [Modeling System Workflows] Initial node Select Unlock Action Enter Key Verify Key Decision [authorized] [not authorized] Signal Success Open Lock & Lit Light Notify Intrusion Sound Alarm Start Autolock Timer Activity final node Merge

LECTURE 6: Domain Modeling. Ivan Marsic Rutgers University

LECTURE 6: Domain Modeling. Ivan Marsic Rutgers University LECTURE 6: Domain Modeling Ivan Marsic Rutgers University Topics Identifying Concepts Concept Attributes Concept Associations Contracts: Preconditions and Postconditions Domain Modeling Why? The goal of

More information

MTAT Software Engineering

MTAT Software Engineering MTAT.03.094 Software Engineering Lecture 04: Analysis Dietmar Pfahl Fall 2013 email: dietmar.pfahl@ut.ee Labs Next Week Part of the lab time will be used for assessment your Task 1 solutions Submission

More information

SWE500. LECTURE 6: Domain Modeling. Ivan Marsic Rutgers University

SWE500. LECTURE 6: Domain Modeling. Ivan Marsic Rutgers University SWE500 LECTURE 6: Domain Modeling Ivan Marsic Rutgers University Topics Identifying Concepts Concept Attributes Concept Associations Contracts: Preconditions and Postconditions Domain Modeling Why? The

More information

LTAT Software Engineering

LTAT Software Engineering LTAT.05.003 Software Engineering Lecture 04: Analysis Dietmar Pfahl Fall 2016 email: dietmar.pfahl@ut.ee ICS Day 2017 Friday, 29 September When? 14:15 Where? Paabel (Ülikooli 17) What? To bring together

More information

MTAT Software Engineering

MTAT Software Engineering MTAT.03.094 Software Engineering Lecture 04: Analysis Dietmar Pfahl Fall 2015 email: dietmar.pfahl@ut.ee Task Resp. Prio Effort Labs This Week Lab 2 Assignment: 1. Project Planning Refinement of requirements

More information

Requirements Engineering. Materials: Pressman (chapters 8,9, 10, 11) Sommerville (Chapters 4, 5)

Requirements Engineering. Materials: Pressman (chapters 8,9, 10, 11) Sommerville (Chapters 4, 5) Requirements Engineering Materials: Pressman (chapters 8,9, 10, 11) Sommerville (Chapters 4, 5) Definition What is Requirement Engineering? Requirement: A function, constraint or other property that the

More information

Rekayasa Perangkat Lunak

Rekayasa Perangkat Lunak Rekayasa Perangkat Lunak Untuk SISTEM KOMPUTER Kuliah 2: Permodelan Obyek Mohammad Iqbal Based-on slide Ivan Marsic Topik Obyek dan Metode Calls Interface Notasi UML Relasi antar Obyek Proses/Algoritma

More information

Rekayasa Perangkat Lunak

Rekayasa Perangkat Lunak Rekayasa Perangkat Lunak Untuk SISTEM KOMPUTER Kuliah 4: Memahami Masalah dan Membagi Pekerjaan Mohammad Iqbal Based-on slide Ivan Marsic Topik Dekomposisi : Partitioning vs. Projection Divisi pekerja

More information

Rekayasa Perangkat Lunak

Rekayasa Perangkat Lunak Rekayasa Perangkat Lunak Untuk SISTEM KOMPUTER Kuliah 3: Manajemen Konfigurasi Perangkat Lunak Mohammad Iqbal Based-on slide Ivan Marsic Topik Definisi Skenario Kerja Revisi fungsi kontrol Git and GitHub

More information

Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modeling. Software Engineering: A Practitioner s Approach by Roger S. Pressman

Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modeling. Software Engineering: A Practitioner s Approach by Roger S. Pressman Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modeling Software Engineering: A Practitioner s Approach by Roger S. Pressman Material Scenario-Based Modeling Flow Oriented Modeling Class-Bases Modeling

More information

MTAT Software Engineering. Written Exam 10 January Start: 9:15 End: 11:45

MTAT Software Engineering. Written Exam 10 January Start: 9:15 End: 11:45 MTAT.03.094 Software Engineering Written Exam 10 January 2014 Start: 9:15 End: 11:45 Important Notes: The exam is open book and open laptop. Web browsing is allowed, but you are not allowed to use e mail

More information

Rekayasa Perangkat Lunak

Rekayasa Perangkat Lunak Rekayasa Perangkat Lunak Untuk SISTEM KOMPUTER Kuliah 6: Arsitektur Perangkat Lunak Mohammad Iqbal Based-on slide Ivan Marsic Topik Desain Arsitektur Perangkat Lunak Keputusan Arsitektural & Key Concerns

More information

: DOOR ENTRY UNIT USER MANUAL EIS-LCD. Programming Software

: DOOR ENTRY UNIT USER MANUAL EIS-LCD. Programming Software : DOOR ENTRY UNIT EIS-LCD Programming Software v.2.0 2018 Page 1 Contents 1 FOR YOUR SAFETY...5 2 INTRODUCTION...6 3 EIS-LCD, EIS-40 FEATURES AND APPLICATIONS...7 4 START UP...8 5 LED INDICATION...9 6

More information

Author: Group 03 Yuly Suvorov, Luke Harvey, Ben Holland, Jordan Cook, Michael Higdon. All Completed SRS2 Steps

Author: Group 03 Yuly Suvorov, Luke Harvey, Ben Holland, Jordan Cook, Michael Higdon. All Completed SRS2 Steps Software Requirements Document for Graffiti Author: Group 03 Yuly Suvorov, Luke Harvey, Ben Holland, Jordan Cook, Michael Higdon Version Date Author Change 0.1 09/13/ SM Initial Document 07 0.2 09/22/

More information

Modeling Requirements

Modeling Requirements Modeling Requirements Critical Embedded Systems Dr. Balázs Polgár Prepared by Budapest University of Technology and Economics Faculty of Electrical Engineering and Informatics Dept. of Measurement and

More information

: DOOR ENTRY UNIT. Programming Software USER MANUAL

: DOOR ENTRY UNIT. Programming Software USER MANUAL : DOOR ENTRY UNIT Programming Software MODELS: EIS-1, EIS-2 OR EIS-4 v.02 2018 Contents 1 FOR YOUR SAFETY...4 2 INTRODUCTION...5 3 EIS-1, EIS-2, EIS-4 FEATURES AND APPLICATIONS...6 4 START UP...7 5 LED

More information

USER GUIDE for ios 1

USER GUIDE for ios 1 USER GUIDE for ios 1 CONTENTS GETTING STARTED 3 DOWNLOAD THE SECURESMART APP 3 LOGIN 3 DASHBOARD 4 MENU 5 SETTING UP TOUCH ID 6 USING THE APPLICATION 7 SECURITY SYSTEM KEYPAD 7 HOME AUTOMATION 8 VIEWING

More information

Call-in Agent Configuration 9

Call-in Agent Configuration 9 Call-in Agent Configuration 9 9.1 Overview of the Call-in Agent The Call-in Agent enables users to access OPC data over the phone. The Call-in Agent configuration sets up the voice and key entries and

More information

R A D I O N I C S. READYKEY K6100 Readykey for Windows. User Guide. Logging In. Logging Out. If an ID device has been issued:

R A D I O N I C S. READYKEY K6100 Readykey for Windows. User Guide. Logging In. Logging Out. If an ID device has been issued: R A D I O N I C S READYKEY K6100 Readykey for Windows User Guide Logging In If an ID device has been issued: 1. Use your ID device with the desktop administration or Central Network Controller (CNC) reader,

More information

MANAGING LOCAL AUTHENTICATION IN WINDOWS

MANAGING LOCAL AUTHENTICATION IN WINDOWS MANAGING LOCAL AUTHENTICATION IN WINDOWS Credentials Manager Windows OS has a set of tools that help remedy some of the authentication challenges. For example, the Credential Manager in Windows 7 and newer

More information

Acceptance Test Plan

Acceptance Test Plan Acceptance Test Plan Terminus Security Contents Power Control... 5 Door Lock... 5 Video Capture... 6 Motion Detection... 7 Temperature Sensing... 7 UPS... 8 Token Authentication... 8 Logging System...

More information

Configuring a Net2 Entry Monitor

Configuring a Net2 Entry Monitor Configuring a Entry Monitor Overview The Entry monitor is an audio/video monitor used to remotely communicate with visitors. It is powered using power over Ethernet (PoE) and communicates with the other

More information

Lesson 3: Identifying Key Characteristics of Workgroups and Domains

Lesson 3: Identifying Key Characteristics of Workgroups and Domains 1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users

More information

Integriti User Manual. Elite / EliteX LCD Terminal Keypads

Integriti User Manual. Elite / EliteX LCD Terminal Keypads Integriti User Manual Elite / EliteX LCD Terminal Keypads INNER RANGE recommends that all INTEGRITI systems are installed & maintained by FACTORY CERTIFIED TECHNICIANS. For a list of Accredited Dealers

More information

Document Number: /4/2012

Document Number: /4/2012 Copyright 2012 icontrol Networks, Inc. All rights reserved. No reproduction in whole or in part without prior written approval. icontrol Networks, icontrol, and icontrol logo design are pending trademarks

More information

SOLO KP SOLO KP LCD COMPACT MULTI-APARTMENT GSM DOOR ENTRY UNIT USER MANUAL

SOLO KP SOLO KP LCD COMPACT MULTI-APARTMENT GSM DOOR ENTRY UNIT USER MANUAL SOLO KP SOLO KP LCD COMPACT MULTI-APARTMENT GSM DOOR ENTRY UNIT Contents 1 FOR YOUR SAFETY... 4 2 INTRODUCTION... 5 3 SOLO-KP AND SOLO-KP LCD FEATURES AND APPLICATIONS... 6 4 START UP... 7 5 LED INDICATION...

More information

D1260/D1260B. Owner's Manual. Keypad

D1260/D1260B. Owner's Manual. Keypad D1260/D1260B EN Owner's Manual Keypad D1260/D1260B Owner's Manual This system includes a telephone line seizure feature. The system may be programmed to communicate with a central monitoring station to

More information

Safehome Project. Analysis Model Prepared by Inyoung Kim Donghan Jang <TEAM 6> KAIST CS350 Introduction to Software Engineering

Safehome Project. Analysis Model Prepared by Inyoung Kim Donghan Jang <TEAM 6> KAIST CS350 Introduction to Software Engineering Safehome Project Analysis Model 2015.5.6 Prepared by Inyoung Kim Donghan Jang KAIST CS350 Introduction to Software Engineering 1 Bootup Feature 1.1 Use case diagram Picture 1: Bootup use case

More information

Control Panels B9512G/B8512G/B6512/B5512/B4512/B3512. en Owner's Manual

Control Panels B9512G/B8512G/B6512/B5512/B4512/B3512. en Owner's Manual Control Panels B9512G/B8512G/B6512/B5512/B4512/B3512 en Owner's Manual Control Panels Table of Contents en 3 Table of contents 1 Introduction 8 1.1 About documentation 9 2 Keypads overview 11 2.1 Identify

More information

EUROPLEX TECHNOLOGIES. WARNING. Copyright. Disclaimer

EUROPLEX TECHNOLOGIES. WARNING. Copyright. Disclaimer EUROPLEX TECHNOLOGIES. Company Web Site address: www.europlex.com Europlex Technologies [Ireland] Ltd. Clonshaugh Industrial Estate, Clonshaugh, Dublin 17, Ireland. Tel: +353-1 - 8485111 Fax: +353-1 -

More information

R A D I O N I C S READYKEY K6100 READYKEY FOR WINDOWS. User Instructions. Logging In. Logging Out. If an ID device has been issued:

R A D I O N I C S READYKEY K6100 READYKEY FOR WINDOWS. User Instructions. Logging In. Logging Out. If an ID device has been issued: R A D I O N I C S READYKEY K6100 READYKEY FOR WINDOWS User Instructions Logging In If an ID device has been issued: 1. Use your ID device with the desktop administration or Central Network Controller (CNC)

More information

HikCentral Control Client. User Manual

HikCentral Control Client. User Manual HikCentral Control Client User Manual Legal Information User Manual 2018 Hangzhou Hikvision Digital Technology Co., Ltd. About this Manual This Manual is subject to domestic and international copyright

More information

Linksys Stackable Switches

Linksys Stackable Switches TECHNICAL BULLETIN Linksys Stackable Switches How to Build Stacks and Understand Their Operation This document describes how to stack Linksys switches and covers advanced stacking information, as well

More information

MULTI-PURPOSE SELF-CONTAINED DIGITAL ACCESS CONTROL KEYPAD

MULTI-PURPOSE SELF-CONTAINED DIGITAL ACCESS CONTROL KEYPAD MULTI-PURPOSE SELF-CONTAINED DIGITAL ACCESS CONTROL PAD Programming & Installation Manual An Innovative Product Developed By: PROTECT - ON SYSTEMS LTD. MANUFACTURED BY: 20 R SINCE 1979 ADVANCED ELECTRONICS

More information

Analysis Models for Safehome System. Team 07 (Choonghwi Lee, Wookjae Byun)

Analysis Models for Safehome System. Team 07 (Choonghwi Lee, Wookjae Byun) Analysis Models for Safehome System Team 07 (Choonghwi Lee, Wookjae Byun) Table of Contents 1. Introduction 3 2. Use cases and its diagrams 3 2.1 Use cases On / Off (Use case #1~#2) 3 2.1.1 Use case diagram

More information

1 P age NEXTIVA CALL CENTER. Supervisor User Guide. nextiva.com/support 2015 NEXTIVA, ALL RIGHTS RESERVED

1 P age NEXTIVA CALL CENTER. Supervisor User Guide. nextiva.com/support 2015 NEXTIVA, ALL RIGHTS RESERVED 1 P age NEXTIVA CALL CENTER Supervisor User Guide nextiva.com/support 2015 NEXTIVA, ALL RIGHTS RESERVED 2 P age Creating Employees... 3 Creating an Employee... 3 Assigning Licenses to Employees... 7 Schedules...

More information

RFID/Digital Access Control Keypad

RFID/Digital Access Control Keypad R Luminous/ RFID/Digital Access Control Keypad Model:YK-368L-R Germany EMC tested FEATURES AND FUNCTIONS Simple Programming, Easy Operation 3-Operation Mode: ID Card Operation, User Code Operation, ID

More information

Control Panels D9412GV4/D7412GV4. en Owner's Manual

Control Panels D9412GV4/D7412GV4. en Owner's Manual Control Panels D9412GV4/D7412GV4 en Owner's Manual Control Panels Table of Contents en 3 Table of contents 1 Introduction 8 1.1 About documentation 9 2 Keypads overview 11 2.1 Identify your keypad style

More information

Installation and User Manual

Installation and User Manual S2 Metal Waterproof Access Control Unit Installation and User Manual (Ness Part No. 101-082) 1 Introduction Ness S2 is an advanced, waterproof (IP65 rated) proximity and PIN Access Controller. S2 can support

More information

Wall-Mounted Laptop Cabinet NOR-HNA1000-SO

Wall-Mounted Laptop Cabinet NOR-HNA1000-SO Wall-Mounted Laptop Cabinet NOR-HNA1000-SO Safety Instructions CAUTION: Install the cabinet in a location where it will not get wet or damaged. Do not use this cabinet in a high-humidity location. Humidity

More information

IRONKEY D300S SECURE USB 3.0 FLASH DRIVE

IRONKEY D300S SECURE USB 3.0 FLASH DRIVE IRONKEY D300S SECURE USB 3.0 FLASH DRIVE User Guide Document No. 48000130-001.A01 D300S Page 1 of 27 Table of Contents About This Manual... 3 System Requirements...3 Recommendations...3 Setup (Windows

More information

INT-TSI Brief User Manual

INT-TSI Brief User Manual int-tsi_u_en 03/15 Keypad INT-TSI Brief User Manual SATEL sp. z o.o. ul. Budowlanych 66 80-298 Gdańsk POLAND tel. 58 320 94 00 info@satel.pl www.satel.eu Firmware version 1.04 WARNINGS Please read this

More information

This chapter provides information about managing end user directory information.

This chapter provides information about managing end user directory information. End user setup This chapter provides information about managing end user directory information. About end user setup, page 1 End user deletion, page 2 End user settings, page 3 Create Cisco Unity Connection

More information

User Guide V6.1g / 48730B

User Guide V6.1g / 48730B READYKEY User Guide Readykey for Windows Software 17231 V6.1g / 48730B UL Listings Trademarks UL 294 - Access Control System Units Microsoft, Windows, Windows NT are either registered trademarks or trademarks

More information

BHD-8000 Access Control Keypad and Card Reader. Wiring Diagram

BHD-8000 Access Control Keypad and Card Reader. Wiring Diagram BHD-8000 Access Control Keypad and Card Reader Wiring Diagram Frontal View Main Technical Specifications Item Operating Voltage Unlock Relay Operating Temperature Value 12VDC+12%/1.2A 12VDC/2A Normal Operation:

More information

Configuration and Operation Manual for the SALTO

Configuration and Operation Manual for the SALTO AxxonSoft Configuration and Operation Manual for the SALTO Integration Module Version 1.2 Moscow, 2011 Contents CONTENTS... 2 1 LIST OF TERMS... 3 2 INTRODUCTION... 4 2.1 Purpose of document... 4 2.2 Structure

More information

Dryer. M720 Programming and Operation Manual. July 15, 2015 Revision 1.51

Dryer. M720 Programming and Operation Manual. July 15, 2015 Revision 1.51 Dryer M720 Programming and Operation Manual July 15, 2015 Revision 1.51 Contents 1 Important Safety Information 1 1.1 FOR YOUR SAFETY - CAUTION!............................. 1 2 Control Overview 2 2.1

More information

3/25/2015 Virtual Keypad Android App Help Guide - Rooms SCHEDULES

3/25/2015 Virtual Keypad Android App Help Guide - Rooms SCHEDULES SCHEDULES This tab is only shown if Schedules are activated by your security company. Schedules allow you to program the times at which you normally turn your burglary protection on and off each day of

More information

PAC2. Series 3 USER CODE PROGRAMMING MANUAL

PAC2. Series 3 USER CODE PROGRAMMING MANUAL PAC2 Series 3 USER CODE PROGRAMMING MANUAL TABLE OF CONTENTS PAGE Entering Programming Mode... 1 Using a Presco Keypad without E Key... 2 Important Note About Programming... 2 Keypad Responses... 2 The

More information

UNIVERSAL EXPANDER FOR CARD / CHIP READERS INT-R. 1. Features. 2. Installation and start-up

UNIVERSAL EXPANDER FOR CARD / CHIP READERS INT-R. 1. Features. 2. Installation and start-up UNIVERSAL EXPANDER FOR CARD / CHIP READERS INT-R int-r_en 09/11 The INT-R expander interfaces with the INTEGRA and CA-64 alarm control panels, replacing the previously offered CA-64 SR and CA-64 DR expanders.

More information

Finger Scanner Manual Book

Finger Scanner Manual Book Finger Keep er S er ies Finger Scanner Manual Book Page 1 F inger Keep er S eries Contents Chapter I Introduction of the Basic Operation of Finger Keeper..4 1. Interface Description of Finger Keeper....4

More information

Deckblatt. APL Operator Guide SIMATIC PCS 7. Application description June Applikationen & Tools. Answers for industry.

Deckblatt. APL Operator Guide SIMATIC PCS 7. Application description June Applikationen & Tools. Answers for industry. Deckblatt SIMATIC PCS 7 Application description June 2011 Applikationen & Tools Answers for industry. Industry Automation and Drive Technologies Service & Support Portal This article is taken from the

More information

Restricted Use Case Modeling Approach

Restricted Use Case Modeling Approach RUCM TAO YUE tao@simula.no Simula Research Laboratory Restricted Use Case Modeling Approach User Manual April 2010 Preface Use case modeling is commonly applied to document requirements. Restricted Use

More information

USER MANUAL. TL400B Fingerprint Lock with Voice Guide Feature. Version: 1.1 Date: Jul. 2017

USER MANUAL. TL400B Fingerprint Lock with Voice Guide Feature. Version: 1.1 Date: Jul. 2017 USER MANUAL TL400B Fingerprint Lock with Voice Guide Feature Version: 1.1 Date: Jul. 2017 1 Content Read Before Use 1 Safety Caution 1 Structure 2 Basic Function 3 User Introduction 3 Operation and Voice

More information

INT-KSG Keypad Quick user s guide

INT-KSG Keypad Quick user s guide INT-KSG Keypad Quick user s guide Firmware version 1.02 int-ksg_u_en 01/13 SATEL sp. z o.o. ul. Schuberta 79 80-172 Gdańsk POLAND tel. + 48 58 320 94 00 info@satel.pl www.satel.eu WARNINGS Please read

More information

2 4PI175 issue 1_6/01. How to unset system in alarm. Programs 1, 2 and 3. Access codes. How to operate Personal Attack

2 4PI175 issue 1_6/01. How to unset system in alarm. Programs 1, 2 and 3. Access codes. How to operate Personal Attack Access codes Contents Unset system indications - - - - - - - - - - - System indication - - - - - - - - - - - - Access codes - - - - - - - - - - - - - - - - How to operate Personal - - - - - - How to unset

More information

We believe that we can make the output of your Aligned Element project look more or less like your existing manually created documentation

We believe that we can make the output of your Aligned Element project look more or less like your existing manually created documentation Word Examples This document shows a few examples on what type of documentation you can generate with Aligned Elements. All examples are listed in the Table of Content on the following page. The naming

More information

SOFTWARE VERSION 3.20

SOFTWARE VERSION 3.20 48EPEP-00 SOFTWARE VERSION 3.20 HEXA PROGRAMMING: Addresses 000 to 043 and 300 to 527 are programmed using the Hexa Programming method. In this mode, you can enter any hexa-digit from 0-F where keys [1]

More information

New Account Creation. 2. Launch the CarLink app. from your phone s application list. 3. Enter a name for the vehicle.

New Account Creation. 2. Launch the CarLink app. from your phone s application list. 3. Enter a name for the vehicle. iphone USERS GUIDE 3/26/14 New Account Creation After having CarLink installed, follow the steps below to begin using your system. If you have already created an account on the Web app you will need to

More information

Digital Lock User Guide

Digital Lock User Guide Digital Lock User Guide KEYPAD Keypad digital locks are operated by a 4-7 digit User Code. Manager Keys provide management access and external power. Programming is accomplished via a Programming Key unique

More information

Consumer User Interface (CUI) Workflows for Adding Accounts

Consumer User Interface (CUI) Workflows for Adding Accounts Consumer User Interface (CUI) Workflows for Adding Accounts 2018 Morningstar. All Rights Reserved. AccountView Version: 1.51 Document Version: 2 Document Issue Date: February 15, 2018 Technical Support:

More information

SigNET 200/300 User Guide

SigNET 200/300 User Guide SigNET 200/300 User Guide Warning: While this system is an advanced design integrated security system, it does not offer guaranteed protection against burglary, fire or other emergency. Any alarm system,

More information

1000-Series Biometric Safe Lock

1000-Series Biometric Safe Lock 1000-Series Biometric Safe Lock Innovative Security Solutions Designed and Manufactured In Australia To International Standards Distributor K.J.Ross Security Locks Pty. Ltd. A.C.N. 060 562 110 A.B.N. 23

More information

Using triggers and actions

Using triggers and actions Using triggers and actions Important For Triggers and Actions to function correctly, the server must be running at all times. Triggers and Actions is a powerful feature. It can be used to report on specific

More information

INT-KSG Keypad Quick user s guide

INT-KSG Keypad Quick user s guide INT-KSG Keypad Quick user s guide Firmware version 1.00 int-ksg_u_en 08/10 SATEL sp. z o.o. ul. Schuberta 79 80-172 Gdańsk POLAND tel. + 48 58 320 94 00 info@satel.pl www.satel.eu WARNINGS Please read

More information

ONYX FINGERPRINT PASSWORD LOCK MANUAL

ONYX FINGERPRINT PASSWORD LOCK MANUAL ONYX FINGERPRINT PASSWORD LOCK MANUAL PREFACE 1. Electronic locks are sensitive and advanced products with fragile micro-chips and hardware. Please be aware that the position and type of environment the

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Case Management System

Case Management System Case Management System Investigator/non-Administrator Instructions Your Lighthouse Services Case Management System (CMS) has been set up and is ready for your use. It is a powerful tool to oversee and

More information

User Manual of TM-LA191 Bluetooth Lock

User Manual of TM-LA191 Bluetooth Lock User Manual of TM-LA191 Bluetooth Lock Don't lock the door until the lock is working during installation and test. Please read all the following guide carefully. Unlock Ways APP ( Bluetooth Electronic

More information

Important Notice. Customer Information. 2 WisDom User Manual

Important Notice. Customer Information. 2 WisDom User Manual User Manual Important Notice This manual is delivered subject to the following conditions and restrictions: This manual contains proprietary information belonging to RISCO Group. The information is supplied

More information

Emerald ICE Index Prompt and Database Programming. June 10, 20 04

Emerald ICE Index Prompt and Database Programming. June 10, 20 04 Emerald ICE and Database Programming June 10, 20 04 and Database Programming 01-1. Extension 01-(SN:101~164)- Show Extension: 01-SN-01 Position 01-SN-02 Tenant Group 01-SN-03 Pickup Group 01-SN-04 Paging

More information

ios App User Manual Fill in the serial number (case insensitive), login (used to recover password), and choose a password.

ios App User Manual Fill in the serial number (case insensitive), login  (used to recover password), and choose a password. 1 ios App User Manual Install our iphone/ipad app from AppStore by searching "Wireless Tag List". Use the 12 digit serial numbers on your Ethernet Tag Manager to create a login. Keep the serial number

More information

Integrated Conference Bridge Professional

Integrated Conference Bridge Professional Title page Communication Server 1000 Integrated Conference Bridge Professional iii Nortel Communication Server 1000 Nortel Integrated Conference Bridge Professional Revision history June 2007 Standard

More information

IDS. Users Guide to Keypad Functions S E C U R I T Y MANUAL NO D ISSUED NOVEMBER 2002 VERSION 2.

IDS.  Users Guide to Keypad Functions S E C U R I T Y MANUAL NO D ISSUED NOVEMBER 2002 VERSION 2. INHEP DIGITAL IDS S E C U R I T Y Users Guide to Keypad Functions MANUAL NO. 700-146-01D ISSUED NOVEMBER 2002 VERSION 2.17 Summary of Operation A rm/ disarm [#] + [USER CODE] Quick Quick Quick Away Arm

More information

National Grid Short Term Operating Reserve System User Manual. National Grid Short Term Operating Reserve System User Manual

National Grid Short Term Operating Reserve System User Manual. National Grid Short Term Operating Reserve System User Manual National Grid i Contents 1 Introduction... 1-1 1.1 Abbreviations and Glossary... 1-1 1.2 Purpose... 1-1 1.3 Overview... 1-1 2 STOR System Interface... 2-1 2.1 Screen Layout... 2-1 2.2 Colour Indication...

More information

PTC Integrity Integration With Microsoft Visual Studio (SDK)

PTC Integrity Integration With Microsoft Visual Studio (SDK) PTC Integrity Integration With Microsoft Visual Studio (SDK) PTC provides a number of integrations for Integrated Development Environments (IDEs). IDE integrations allow you to access the workflow and

More information

12/05/2017. Geneva ServiceNow Security Management

12/05/2017. Geneva ServiceNow Security Management 12/05/2017 Security Management Contents... 3 Security Incident Response...3 Security Incident Response overview... 3 Get started with Security Incident Response... 6 Security incident creation... 40 Security

More information

Bartley Ridge SECURITY SYSTEMS. User s Guide

Bartley Ridge SECURITY SYSTEMS. User s Guide Bartley Ridge SECURITY SYSTEMS User s Guide 1 OPERATING INSTRUCTION 1.0 AUDIO VIDEO TELEPHONY SYSTEM 1.1 Resident s Phone Unit 1.2 Visitor Call Panel at lift lobby 2.0 PROXIMITY CARD ACCESS SYSTEM 3.0

More information

UML Modelling and the Art of Improv

UML Modelling and the Art of Improv UML Modelling and the Art of Improv Dr Terri Lydiard has over 30 years experience in Business Analysis. During this time she has worked for numerous major UK and International Companies, across a range

More information

Case Management System

Case Management System Case Management System Investigator/non-Administrator Instructions Your Lighthouse Services Case Management System (CMS) has been set up and is ready for your use. It is a powerful tool to oversee and

More information

Troubleshooting. EAP-FAST Error Messages CHAPTER

Troubleshooting. EAP-FAST Error Messages CHAPTER CHAPTER 6 This chapter describes EAP-FAST error messages. This chapter also provides guidelines for creating strong passwords. The following topics are covered in this chapter:, page 6-1 Creating Strong

More information

Pass4sure CASECURID01.70 Questions

Pass4sure CASECURID01.70 Questions Pass4sure.050-80-CASECURID01.70 Questions Number: 050-80-CASECURID01 Passing Score: 800 Time Limit: 120 min File Version: 4.8 http://www.gratisexam.com/ 050-80-CASECURID01 RSA SecurID Certified Administrator

More information

T9 Fingerprint Machine Hardware User Manual. Date: Version: 1.1

T9 Fingerprint Machine Hardware User Manual. Date: Version: 1.1 T9 Fingerprint Machine Hardware User Manual Date: 2010.07.27 Version: 1.1 (c)2010 Copyright Pegasus Equipments Ltd. All Rights Reserved. 1 Table of Content Introduction... 3 Installation... 3 Menu Structure...

More information

SILENCING AN ALARM. When the alarm bell or siren is sounding, enter your user code or present your keyfob to your keypad.

SILENCING AN ALARM. When the alarm bell or siren is sounding, enter your user code or present your keyfob to your keypad. S Y S T E M U S E R G U I D E SILENCING AN ALARM When the alarm bell or siren is sounding, enter your user code or present your keyfob to your keypad. IS THIS A FALSE ALARM? YES NO displays. REAL ALARM

More information

Associated Bank. Remote Deposit User Guide. Page 1 of 33

Associated Bank. Remote Deposit User Guide. Page 1 of 33 Associated Bank Remote Deposit User Guide Page 1 of 33 Table of Contents CHAPTER 1: GETTING STARTED... 3 Minimum system requirements... 3 Currently supported scanners include the following operating systems:...

More information

Finite State Machines and Statecharts

Finite State Machines and Statecharts Finite State Machines and Statecharts Hassan Gomaa Dept of Information & Software Engineering George Mason University Reference: H. Gomaa, Chapter 10 - Designing Concurrent, Distributed, and Real-Time

More information

Total Connect 2.0 Online Help

Total Connect 2.0 Online Help Security Events Users Locations Video Hints for use. After logging in hit F11 to toggle full screen mode. Hover over icons for tool tip help. Upon the initial login, control panel data should be imported

More information

K44 Code lock. Technical manual

K44 Code lock. Technical manual K44 Code lock GB Technical manual Copyright 2002 Bewator AB, Solna, Sweden. Material from the K44 Technical manual may only be copied with the consent in writing of Bewator. Bewator reserves the right

More information

End User Setup. About End User Setup

End User Setup. About End User Setup This chapter provides information about managing end user directory information. About, on page 1 End User Deletion, on page 3 End User Settings, on page 4 Create Cisco Unity Connection Voice Mailbox,

More information

Agent Console. The Agent Console. The topics in this section provide information about the Agent Console.

Agent Console. The Agent Console. The topics in this section provide information about the Agent Console. Agent Console The topics in this section provide information about the Agent Console. The Agent Console The agent logs into the workstation The agent is automatically logged in to Intradiem; the Agent

More information

Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE)

Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) Model Builder User Guide Version 1.3 (24 April 2018) Prepared For: US Army Corps of Engineers 2018 Revision History Model

More information

Lecture 8: Goals and Scenarios. Pohl K., Requirements Engineering: Fundamentals, Principles, and Techniques, Springer, 2010, 814p.

Lecture 8: Goals and Scenarios. Pohl K., Requirements Engineering: Fundamentals, Principles, and Techniques, Springer, 2010, 814p. Lecture 8: Goals and Scenarios Pohl K., Requirements Engineering: Fundamentals, Principles, and Techniques, Springer, 2010, 814p. 2 Documenting Goals 3 Documenting Goals 1. Each goal must have a unique

More information

Pearson Education 2005 Chapter 9 (Maciaszek - RASD 2/e) 2

Pearson Education 2005 Chapter 9 (Maciaszek - RASD 2/e) 2 MACIASZEK, L.A. (2005): Requirements Analysis and System Design, 2 nd ed. Addison Wesley, Harlow England, 504p. ISBN 0 321 20464 6 Chapter 9 Testing and Change Management Pearson Education Limited 2005

More information

Digital Electronic Lock OWNER S MANUAL

Digital Electronic Lock OWNER S MANUAL CAL-ROYAL CR3000 Digital Electronic Lock OWNER S MANUAL THANK YOU for purchasing CAL-ROYAL CR 3000 Digital Lock. Your new CAL-ROYAL CR3000 Digital Lock advanced features include: 1 Master Code for entry

More information

Perceptive Nolij Web. Release Notes. Version: 6.8.x

Perceptive Nolij Web. Release Notes. Version: 6.8.x Perceptive Nolij Web Release Notes Version: 6.8.x Written by: Product Knowledge, R&D Date: June 2018 Copyright 2014-2018 Hyland Software, Inc. and its affiliates. Table of Contents Perceptive Nolij Web

More information

New Password Reset for Dental Connect Provider

New Password Reset for Dental Connect Provider New Password Reset for Dental Connect Provider 1 INDEX Access Dental Connect for Providers:... 3 1. Username verification:... 4 1.1 user name not provided:... 5 1.2 Invalid user name:... 6 1.3 Invalid

More information

BusinessOnline Security Device Guide Introduction Objectives The Device LCD Display Keypad Menu/Backspace Button OK/Power Button Serial Number

BusinessOnline Security Device Guide Introduction Objectives The Device LCD Display Keypad Menu/Backspace Button OK/Power Button Serial Number BusinessOnline Security Device Guide Introduction Objectives This document contains instructions in the use of the Security Device that is used in conjunction with the BusinessOnline service provided by

More information

SNMP Web Management. User s Manual

SNMP Web Management. User s Manual SNMP Web Management User s Manual Suitable Product: SNMP Web Card SNMP Web Box Management Software for Uninterruptible Power Supply Systems Table of Contents 1. Overview... 1 1.1 Introduction... 1 1.2

More information

TRAINING MANAGEMENT SYSTEM MANUAL

TRAINING MANAGEMENT SYSTEM MANUAL TRAINING MANAGEMENT SYSTEM MANUAL Publication SPI82-0811 Table of Contents OVERVIEW... 1 INTRODUCTION... 1 ABOUT SAFE PASSAGE AND YOU... 2 SOFTWARE... 2 TRAINING... 2 UNDERSTANDING SAFE PASSAGE... 3 USING

More information

USER MANUAL TEMPLATE ELECTRONIC DEADBOLT LOCK

USER MANUAL TEMPLATE ELECTRONIC DEADBOLT LOCK Mark Ø1" (25.4mm) hole at center of door edge. 2" 1-3/4" 1-9/16" 1-3/8" 51 45 40 35 Fit here on door edge FOR BACKSET 70mm (2-3/4 ) FOR BACKSET 60mm (2-3/8 ) TEMPLATE Limited Warranty Statements 1. Warranty

More information